
Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. We use the following keyboard shortcuts every day: Base Key + Combination Result +... Read more

1. What is the size of a sector on a hard disk? A. 512K B. 1K C. 512 bytes D. 4K 2. How many devices can exist in an IDE chain? A. 1 B. 2 C. 3 D. 4 3.... Read more

The Industrial Internet of Things (IIoT), aka the Industrial Internet, is the integration of complex machinery with networked sensors and software. The machines are connected and talking to each other, and communicating back to centralized control systems e.g. Manufacturing factories,... Read more

In Greek mythology, Medusa was a monster, a Gorgon, generally described as a winged human female with living venomous snakes in place of hair. Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many... Read more

Kali Linux is an open source operating system developed by Offensive Security . It contains a bunch of security tools divided by categories for Penetration Testing or Ethical Hacking in a practical environment to test the reliability and security of... Read more

As you know, Firefox is one of the most popular browser not by ranking but it also supports add-on/plugins to enhance the functionality. Mozilla has a website where you can find various plugins placed in different categories. So we’re explaining... Read more

Base64 is a group of similar binary-to-text encoding schemes that represents binary data in an ASCII string format by translating it into radix-64 representation. The example below uses ASCII text for simplicity, but this is not a typical use case,... Read more

In Internet, more than 70% websites are using ready-made open source CMS like WordPress/Joomla/Drupal etc because a CMS always makes your website easier to use, less expensive to maintain. As we all knows, CMS is a software that stores your... Read more

This Crimemail CTF is brought you by InSecurity, a student society from INSA Lyon (France). The Flag format should be look like INSA{…} Collins Hackle is a notorious bad guy who is behind in this CTF. Challenge – Your challenge... Read more

Approx a year back, Mozilla added a new feature “Captive Portal” support to Firefox browser in an attempt to enhance usability when connecting to free Wi-Fi portals. Captive Portal feature covers the detection and implementation of handles for captive portals... Read more

Welcome back to Kioptrix CTF Series! Previously we’ve covered up to 3 Levels of Kioptrix series CTF which you can find by this link. Alright lets start the 4th level of Kioptrix series. Download Link – http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar (Level 1.3) Size –... Read more

1. Which type of memory cannot be upgraded without replacing a CPU? A. RAM B. L1 cache C. L2 cache D. None of the above 2. Which type of the system BIOS can be upgraded? A. Flashable B. Non-flashable C.... Read more
Recent Comments